FATEK Automation WinProladder
FATEK WinProladder versions 3.30 and earlier contain a buffer overflow or memory corruption vulnerability (CWE-191) that allows arbitrary code execution if a user opens a specially crafted project file. The vulnerability is triggered during file parsing and requires no special privileges. FATEK is developing a fix. The vulnerability is not remotely exploitable; an attacker must trick a user into opening a malicious project file, typically via email or social engineering. Successful exploitation allows the attacker to run code with the privileges of the engineering workstation user, potentially compromising PLC configuration and control logic.
- Local access to the engineering workstation running WinProladder
- User must open a malicious project file
- Attacker must craft project file with buffer overflow payload
- No special privileges or authentication needed on the engineering station
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f2ad1629-4068-4cf1-9f6b-48f4363b05f0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.